Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/1.2/patches/2234739/?format=api
{ "id": 2234739, "url": "http://patchwork.ozlabs.org/api/1.2/patches/2234739/?format=api", "web_url": "http://patchwork.ozlabs.org/project/linux-pci/patch/20260508031710.514574-4-alistair.francis@wdc.com/", "project": { "id": 28, "url": "http://patchwork.ozlabs.org/api/1.2/projects/28/?format=api", "name": "Linux PCI development", "link_name": "linux-pci", "list_id": "linux-pci.vger.kernel.org", "list_email": "linux-pci@vger.kernel.org", "web_url": null, "scm_url": null, "webscm_url": null, "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<20260508031710.514574-4-alistair.francis@wdc.com>", "list_archive_url": null, "date": "2026-05-08T03:16:55", "name": "[03/18] X.509: Parse Subject Alternative Name in certificates", "commit_ref": null, "pull_url": null, "state": "new", "archived": false, "hash": "c42f2703e26392c9e5123ceed734052dc9a71e46", "submitter": { "id": 64571, "url": "http://patchwork.ozlabs.org/api/1.2/people/64571/?format=api", "name": "Alistair Francis", "email": "alistair23@gmail.com" }, "delegate": null, "mbox": "http://patchwork.ozlabs.org/project/linux-pci/patch/20260508031710.514574-4-alistair.francis@wdc.com/mbox/", "series": [ { "id": 503312, "url": "http://patchwork.ozlabs.org/api/1.2/series/503312/?format=api", "web_url": "http://patchwork.ozlabs.org/project/linux-pci/list/?series=503312", "date": "2026-05-08T03:16:52", "name": "lib: Rust implementation of SPDM", "version": 1, "mbox": "http://patchwork.ozlabs.org/series/503312/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/patches/2234739/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/2234739/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "\n <linux-pci+bounces-54158-incoming=patchwork.ozlabs.org@vger.kernel.org>", "X-Original-To": [ "incoming@patchwork.ozlabs.org", "linux-pci@vger.kernel.org" ], "Delivered-To": "patchwork-incoming@legolas.ozlabs.org", "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=gmail.com header.i=@gmail.com header.a=rsa-sha256\n header.s=20251104 header.b=JjAfJZju;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=2600:3c04:e001:36c::12fc:5321; helo=tor.lore.kernel.org;\n envelope-from=linux-pci+bounces-54158-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)", "smtp.subspace.kernel.org;\n\tdkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com\n header.b=\"JjAfJZju\"", "smtp.subspace.kernel.org;\n arc=none smtp.client-ip=209.85.214.173", "smtp.subspace.kernel.org;\n dmarc=pass (p=none dis=none) header.from=gmail.com", "smtp.subspace.kernel.org;\n spf=pass smtp.mailfrom=gmail.com" ], "Received": [ "from tor.lore.kernel.org (tor.lore.kernel.org\n [IPv6:2600:3c04:e001:36c::12fc:5321])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4gBZ8X0VB6z1yCg\n\tfor <incoming@patchwork.ozlabs.org>; Fri, 08 May 2026 13:18:52 +1000 (AEST)", "from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby tor.lore.kernel.org (Postfix) with ESMTP id E7E88306395E\n\tfor <incoming@patchwork.ozlabs.org>; Fri, 8 May 2026 03:17:49 +0000 (UTC)", "from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id 6A9C02E7635;\n\tFri, 8 May 2026 03:17:48 +0000 (UTC)", "from mail-pl1-f173.google.com (mail-pl1-f173.google.com\n [209.85.214.173])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id 0CE1C2DECBA\n\tfor <linux-pci@vger.kernel.org>; Fri, 8 May 2026 03:17:46 +0000 (UTC)", "by mail-pl1-f173.google.com with SMTP id\n d9443c01a7336-2b7d3ecc10dso14670725ad.2\n for <linux-pci@vger.kernel.org>; Thu, 07 May 2026 20:17:46 -0700 (PDT)", "from toolbx.alistair23.me ([2403:581e:fdf9:0:6209:4521:6813:45b7])\n by smtp.gmail.com with ESMTPSA id\n d9443c01a7336-2baf1eafa62sm3220685ad.74.2026.05.07.20.17.38\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Thu, 07 May 2026 20:17:45 -0700 (PDT)" ], "ARC-Seal": "i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1778210268; cv=none;\n b=OUKCGp7lFXu/m9ZHyEll2boF0cF8phSujYtIfMJtt4IOzlxipfO/hbHtiE9Y3xUIxPxz8lPOEUZHajj6DOruows4CyHjvU/HzBua4eXkUut7xMGj87/F/L3ho5WBPAIMyhmpPy7c8ymzrfZFEAKfzl+08MWVjmZAHKhY36a8JBI=", "ARC-Message-Signature": "i=1; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1778210268; c=relaxed/simple;\n\tbh=KQNEGxY9INaXySHb00KAS0/IBHXY6dy/wI2exWO1eig=;\n\th=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References:\n\t MIME-Version:Content-Type;\n b=DWstk7XkAW39fJimRvQ7s2Bv78GMn+JP1cElqX9Mcf4lolwi7iHRT7PGHMevpZRUMKL+R96r+DpOMh9rJxUWXBT6LIrblrzRxV7QzUIRenl9dN4H7k5CNXvi+e26vdzt5b5Bin6ghfx71M9kVdkNQdcyOkfPX7iWq4xWzi+YqLY=", "ARC-Authentication-Results": "i=1; smtp.subspace.kernel.org;\n dmarc=pass (p=none dis=none) header.from=gmail.com;\n spf=pass smtp.mailfrom=gmail.com;\n dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com\n header.b=JjAfJZju; arc=none smtp.client-ip=209.85.214.173", "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=gmail.com; s=20251104; t=1778210266; x=1778815066;\n darn=vger.kernel.org;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:from:to:cc:subject:date\n :message-id:reply-to;\n bh=+exDoq3R7sORPn6CGzFv/4xCKwv+Zs0uPc325B74MH4=;\n b=JjAfJZjuCp3AqFLkx0KYP3+v+FYdh6/AMit6bMvm/eB7cVDO0hVqeiJ1NnJAJ7QpEo\n 1Etlj16bnBEWTm7Ecw/sFz7hMRWybOVNKou22kDL8mkV/IpdJP0hpSE1pCSWxEo4rLGL\n B9a6YH3Ovw+qzTWcv/QpC9MzR3D/F6Et2wy/XlzamW+ARC4ls3JHJGDXkp8O6oIRvAwM\n /fx7GX/nInP1smdOC3RIP67O0kD0nWuvRynZKER8N3CJGFEoz/nrS2Qa5aYJVKbptQUb\n sQ3WG3gQmtCy3GO4AFKs4TMVFNFXISFWlapvDN6Zktdg9d28C39WBSPrEUMnf/jxr+R5\n Fovg==", "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1778210266; x=1778815066;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from\n :to:cc:subject:date:message-id:reply-to;\n bh=+exDoq3R7sORPn6CGzFv/4xCKwv+Zs0uPc325B74MH4=;\n b=fOSWmxT2odL1//uomk3ChpjuKfsW9MjZuTra24xjG9JArdccw3sTWM9VG29jjQmviC\n qfjpDE01TdTamo1LzwZGd2qx1aBFQxV5tOL3XQfDgDCl4FpN240KkcAStRl5X+Ur1m1V\n 54GQSjbStzwyBduG6IdFAjMqtOhwRxeZNZuCVO6v3CJnKbdBBMxRiTABSA3YlX6S5Qfs\n 7o5aiZVPliMonXjnyWRSTDVF8IkAXIQPPHkgYKzF89OAJkSbzsnlnCd7esfyhNcPkK3i\n 1eMwumI0CgPkVc7alIUocxc/R9LVQTRjE7/DG5fr0AmJzj2TlIByFfZ77EBRzOmwoGjM\n xLpw==", "X-Forwarded-Encrypted": "i=1;\n AFNElJ/Xs45u4+WBkCgIQvv7QulZAgw6ek+u6Ff2s+4pKNYo2EFdLNFwngJ8rOJXs6hfi+iojyIrVcLl1ws=@vger.kernel.org", "X-Gm-Message-State": "AOJu0YzkpqMZqpcULqrVmQs9kEAKi4gIRsBqVykHlheHTzsr+1N+POzh\n\tNxH1qOspI06pf+67q57mx0AkJIhVIFIRdB0z9hg/Mq2/AWNUdbF38wzO", "X-Gm-Gg": "Acq92OHfkrXDS8zlXb1CkmfmcphGgvVFEdqur3ogAUB3fepZXyiA0rAQ81HpTkfVpHI\n\tUkoaZQXMJ3w5khIVn/uT7LejgT50oJyjTvodt5g13Nv7VHA2+X+WeYIkCXuUD+FejFquQ4uDUHw\n\t6NejYQdPAOEF4KqpU+dpWWNI+qznwsxJZcLfoNqvhv/ZsHJsB6BEXanBaXrv/XqqjeoTtX6pqKw\n\tp9Re2XBvhTRIj6z+2mJA5ZFzXhfYT3uE/fdSuYJ5Y35qU4El480Bm4w3KzIbrsEhUjdi44YtpAw\n\tGOCLAw6Lj+M8wGwtdqee07FLSI7A34PAiUoZ/D/xbpi2NsF0l6Ds/nZ4SkWAI6Qo8ftIWV1oQdm\n\to8OTYNGegrK1vp9a5NEGbzHIRmJ6Z/f83Bj1om14Ej8+N/hupiCxe4w8e92CWs7MwMUjzalEhId\n\tj5NhLOIFinoOXfy7qitW3pNM5DUVpNZ+AUUoBIeq+DMs9NrjnjxY8=", "X-Received": "by 2002:a17:902:fb43:b0:2b2:489a:f46a with SMTP id\n d9443c01a7336-2ba798d2797mr77415615ad.36.1778210266365;\n Thu, 07 May 2026 20:17:46 -0700 (PDT)", "From": "alistair23@gmail.com", "X-Google-Original-From": "alistair.francis@wdc.com", "To": "alistair@alistair23.me,\n\tlinux-kernel@vger.kernel.org,\n\tlukas@wunner.de,\n\tJonathan.Cameron@huawei.com,\n\tbhelgaas@google.com,\n\trust-for-linux@vger.kernel.org,\n\takpm@linux-foundation.org,\n\tlinux-cxl@vger.kernel.org,\n\tdjbw@kernel.org,\n\tlinux-pci@vger.kernel.org", "Cc": "alex.gaynor@gmail.com, wilfred.mallawa@wdc.com, gary@garyguo.net,\n bjorn3_gh@protonmail.com, benno.lossin@proton.me, aliceryhl@google.com,\n boqun.feng@gmail.com, a.hindborg@kernel.org, tmgross@umich.edu,\n ojeda@kernel.org, alistair23@gmail.com,\n Alistair Francis <alistair.francis@wdc.com>,\n =?utf-8?q?Ilpo_J=C3=A4rvinen?= <ilpo.jarvinen@linux.intel.com>,\n Dan Williams <dan.j.williams@intel.com>", "Subject": "[PATCH 03/18] X.509: Parse Subject Alternative Name in certificates", "Date": "Fri, 8 May 2026 13:16:55 +1000", "Message-ID": "<20260508031710.514574-4-alistair.francis@wdc.com>", "X-Mailer": "git-send-email 2.52.0", "In-Reply-To": "<20260508031710.514574-1-alistair.francis@wdc.com>", "References": "<20260508031710.514574-1-alistair.francis@wdc.com>", "Precedence": "bulk", "X-Mailing-List": "linux-pci@vger.kernel.org", "List-Id": "<linux-pci.vger.kernel.org>", "List-Subscribe": "<mailto:linux-pci+subscribe@vger.kernel.org>", "List-Unsubscribe": "<mailto:linux-pci+unsubscribe@vger.kernel.org>", "MIME-Version": "1.0", "Content-Type": "text/plain; charset=UTF-8", "Content-Transfer-Encoding": "8bit" }, "content": "From: Lukas Wunner <lukas@wunner.de>\n\nThe upcoming support for PCI device authentication with CMA-SPDM\n(PCIe r6.1 sec 6.31) requires validating the Subject Alternative Name\nin X.509 certificates.\n\nStore a pointer to the Subject Alternative Name upon parsing for\nconsumption by CMA-SPDM.\n\nSigned-off-by: Lukas Wunner <lukas@wunner.de>\nReviewed-by: Wilfred Mallawa <wilfred.mallawa@wdc.com>\nReviewed-by: Alistair Francis <alistair.francis@wdc.com>\nReviewed-by: Ilpo Järvinen <ilpo.jarvinen@linux.intel.com>\nReviewed-by: Jonathan Cameron <Jonathan.Cameron@huawei.com>\nAcked-by: Dan Williams <dan.j.williams@intel.com>\n---\n crypto/asymmetric_keys/x509_cert_parser.c | 9 +++++++++\n include/keys/x509-parser.h | 2 ++\n 2 files changed, 11 insertions(+)", "diff": "diff --git a/crypto/asymmetric_keys/x509_cert_parser.c b/crypto/asymmetric_keys/x509_cert_parser.c\nindex bfd10f0195e0..c3ec2846695a 100644\n--- a/crypto/asymmetric_keys/x509_cert_parser.c\n+++ b/crypto/asymmetric_keys/x509_cert_parser.c\n@@ -596,6 +596,15 @@ int x509_process_extension(void *context, size_t hdrlen,\n \t\treturn 0;\n \t}\n \n+\tif (ctx->last_oid == OID_subjectAltName) {\n+\t\tif (ctx->cert->raw_san)\n+\t\t\treturn -EBADMSG;\n+\n+\t\tctx->cert->raw_san = v;\n+\t\tctx->cert->raw_san_size = vlen;\n+\t\treturn 0;\n+\t}\n+\n \tif (ctx->last_oid == OID_keyUsage) {\n \t\t/*\n \t\t * Get hold of the keyUsage bit string\ndiff --git a/include/keys/x509-parser.h b/include/keys/x509-parser.h\nindex 8b68e720693a..4e6a05a8c7a6 100644\n--- a/include/keys/x509-parser.h\n+++ b/include/keys/x509-parser.h\n@@ -38,6 +38,8 @@ struct x509_certificate {\n \tunsigned\traw_subject_size;\n \tunsigned\traw_skid_size;\n \tconst void\t*raw_skid;\t\t/* Raw subjectKeyId in ASN.1 */\n+\tconst void\t*raw_san;\t\t/* Raw subjectAltName in ASN.1 */\n+\tunsigned\traw_san_size;\n \tunsigned\tindex;\n \tbool\t\tseen;\t\t\t/* Infinite recursion prevention */\n \tbool\t\tverified;\n", "prefixes": [ "03/18" ] }